okta provider
play

Okta Provider The Okta provider is used to interact with the - PDF document

Okta Provider The Okta provider is used to interact with the resources supported by Okta. The provider needs to be congured with the proper credentials before it can be used. Use the navigation to the left to read about the available


  1. Okta Provider The Okta provider is used to interact with the resources supported by Okta. The provider needs to be con�gured with the proper credentials before it can be used. Use the navigation to the left to read about the available resources. Example Usage provider "okta" { org_name = = "dev-123456" base_url = = "okta.com" api_token = = "xxxx" } Authentication The Okta provider o�ers a �exible means of providing credentials for authentication. The following methods are supported, in this order, and explained below: Environment variables Provider Con�g Environment variables You can provide your credentials via the OKTA_API_TOKEN . provider "okta" {} Usage: $ export OKTA_API_TOKEN= ="xxxx" $ terraform plan Argument Reference In addition to generic provider arguments (https://www.terraform.io/docs/con�guration/providers.html) (e.g. alias and version ), the following arguments are supported in the Okta provider block: org_name - (Required) This is the org name of your Okta account, for example dev-123.oktapreview.com would have an org name of dev-123 . It must be provided, but it can also be sourced from the OKTA_ORG_NAME .

  2. base_url - (Required) This is the domain of your Okta account, for example dev-123.oktapreview.com would have a base url of oktapreview.com . It must be provided but it can also be sourced from the OKTA_BASE_URL . api_token - (Required) This is the API token to interact with your Okta org. backoff - (Optional) Whether to use exponential back o� strategy for rate limits, the default is true . min_wait_seconds - (Optional) Minimum seconds to wait when rate limit is hit, the default is 30 . max_wait_seconds - (Optional) Maximum seconds to wait when rate limit is hit, the default is 300 . max_retries - (Optional) Maximum number of retries to attempt before returning an error, the default is 5 .

  3. okta_app Use this data source to retrieve the collaborators for a given repository. Example Usage data "okta_app" "example" { label = = "Example App" } Arguments Reference label - (Optional) The label of the app to retrieve, con�icts with label_prefix and id . label_prefix - (Optional) Label pre�x of the app to retrieve, con�icts with label and id . This will tell the provider to do a starts with query as opposed to an equals query. id - (Optional) id of application to retrieve, con�icts with label and label_prefix . active_only - (Optional) tells the provider to query for only ACTIVE applications. Attributes Reference id - id of application. label - label of application. description - description of application. name - name of application. status - status of application.

  4. okta_app_saml Use this data source to retrieve the collaborators for a given repository. Example Usage data "okta_app_saml" "example" { label = = "Example App" } Arguments Reference label - (Optional) The label of the app to retrieve, con�icts with label_prefix and id . label_prefix - (Optional) Label pre�x of the app to retrieve, con�icts with label and id . This will tell the provider to do a starts with query as opposed to an equals query. id - (Optional) id of application to retrieve, con�icts with label and label_prefix . active_only - (Optional) tells the provider to query for only ACTIVE applications. Attributes Reference id - id of application. label - label of application. description - description of application. name - name of application. status - status of application. key_id - Certi�cate key ID. auto_submit_toolbar - Display auto submit toolbar. hide_ios - Do not display application icon on mobile app. hide_web - Do not display application icon to users default_relay_state - Identi�es a speci�c application resource in an IDP initiated SSO scenario. sso_url - Single Sign on Url. recipient - The location where the app may present the SAML assertion. destination - Identi�es the location where the SAML response is intended to be sent inside of the SAML assertion. audience - Audience restriction.

  5. idp_issuer - SAML issuer ID. sp_issuer - SAML service provider issuer. subject_name_id_template - Template for app user's username when a user is assigned to the app. subject_name_id_format - Identi�es the SAML processing rules. response_signed - Determines whether the SAML auth response message is digitally signed. request_compressed - Denotes whether the request is compressed or not. assertion_signed - Determines whether the SAML assertion is digitally signed. signature_algorithm - Signature algorithm used ot digitally sign the assertion and response. digest_algorithm - Determines the digest algorithm used to digitally sign the SAML assertion and response. honor_force_authn - Prompt user to re-authenticate if SP asks for it. authn_context_class_ref - Identi�es the SAML authentication context class for the assertion’s authentication statement. accessibility_self_service - Enable self service. accessibility_error_redirect_url - Custom error page URL. accessibility_login_redirect_url - Custom login page URL. features - features enabled. user_name_template - Username template. user_name_template_suffix - Username template su�x. user_name_template_type - Username template type. app_settings_json - Application settings in JSON format. attribute_statements - SAML Attribute statements.

  6. okta_app_saml_metadata Use this data source to retrieve the collaborators for a given repository. Example Usage data "okta_app_saml_metadata" "example" { app_id = = "<app id>" key_id = = "<cert key id>" } Arguments Reference app_id - (Required) The application ID. key_id - (Required) Certi�cate Key ID. Attributes Reference metadata - raw metadata of application. http_redirect_binding - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect location from the SAML metadata. http_post_binding - urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post location from the SAML metadata. certificate - public certi�cate from application metadata. want_authn_requests_signed - Whether authn requests are signed. entity_id - Entity URL for instance https://www.okta.com/saml2/service-provider/sposcfdmlybtwkdcgtuf .

  7. okta_auth_server Use this data source to retrieve an auth server from Okta. Example Usage data "okta_auth_server" "example" { name = = "Example Auth" } Arguments Reference name - (Required) The name of the auth server to retrieve. Attributes Reference id - Authorization server id. name - The name of the auth server. description - description of Authorization server. audiences - array of audiences, kid - auth server key id. credentials_last_rotated - last time credentials were rotated. credentials_next_rotation - next time credentials will be rotated credentials_rotation_mode - mode of credential rotation, auto or manual. status - the activation status of the authorization server.

  8. okta_default_policy Use this data source to retrieve a "Default" policy from Okta. This same thing can be achieved using the okta_policy with name = "Default" , this is simply a shortcut. Example Usage data "okta_default_policy" "example" { type = = "PASSWORD" } Arguments Reference type - (Required) type of policy to retrieve. Attributes Reference id - id of policy. type - type of policy.

  9. okta_everyone_group Use this data source to retrieve the Everyone group from Okta. The same can be achieved with the okta_group data source with name = "Everyone" . This is simply a shortcut. Example Usage data "okta_everyone_group" "example" {} Attributes Reference id - the id of the group.

  10. okta_group Use this data source to retrieve a group from Okta. Example Usage data "okta_group" "example" { label = = "Example App" } Arguments Reference name - (Required) name of group to retrieve. include_users - (Optional) whether or not to retrieve all member ids. Attributes Reference id - id of group. name - name of group. description - description of group. users - user ids that are members of this group, only included if include_users is set to true .

  11. okta_idp_saml Use this data source to retrieve a SAML IdP from Okta. Example Usage data "okta_idp_saml" "example" { label = = "Example App" } Arguments Reference name - (Optional) The name of the idp to retrieve, con�icts with id . id - (Optional) The id of the idp to retrieve, con�icts with name . Attributes Reference id - id of idp. name - name of the idp. type - type of idp. acs_binding - HTTP binding used to receive a SAMLResponse message from the IdP. acs_type - Determines whether to publish an instance-speci�c (trust) or organization (shared) ACS endpoint in the SAML metadata. sso_url - single sign on url. sso_binding - single sign on binding. sso_destination - SSO request binding, HTTP-POST or HTTP-REDIRECT. subject_format - Expression to generate or transform a unique username for the IdP user. subject_filter - regular expression pattern used to �lter untrusted IdP usernames. issuer - URI that identi�es the issuer (IdP). issuer_mode - indicates whether Okta uses the original Okta org domain URL, or a custom domain URL in the request to the IdP. audience - URI that identi�es the target Okta IdP instance (SP) kid - Key ID reference to the IdP's X.509 signature certi�cate.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend